TejayEmpirics - Information Systems

advertisement
Gurvirender Tejay
02/04/2004
INFO 790: Theory of Information
Empirics
The logic of secrecy was the mirror image of the logic of information. (Colin Burke 1994)
Empirics represent one of the branches of Semiotics (the study of signs). Empirics is the
study of the physical characteristics of the medium of communication. It is concerned
with the signals used to code and transmit the message. Empirics involves the study of
communication channels and their characteristics like sound and electronic transmission.
It is generally associated with Shannon’s (1948) A Mathematical Theory of
Communication also referred to as information or communication theory. In this paper I
briefly introduce two separate works of Shannon (1949) and Hill (1929) from the field of
cryptology that can be considered at the level of empirics. Cryptology is the science of
(overt) secret writing (cryptography), of its unauthorized decryption (cryptanalysis), and
of the rules which are in turn intended to make that unauthorized decryption more
difficult (encryption security) [Bauer:2000]. It has become popular in protecting
communication channels, databases, and software. In terms of modern mathematics,
cryptology shows traits of statistics, combinatory algebra, and stochastics. Shannon’s
(1949) work “Communication Theory of Secrecy Systems” involves stochastics, whereas
Hill’s (1929) “Cryptography in an Algebraic Alphabet” involves combinatory algebra.
Shannon’s work in cryptography was presented in terms of communication theory.
Shannon considered secrecy system as almost identical with a noisy communication
system. His work was based on the idea of redundancy in language. A message with less
redundancy had a cryptogram that was more difficult to crack. Shannon demonstrated
how to make cryptograms more difficult to decipher as well as how much encrypted text
is needed to decipher it to the original message. Shannon’s paper “Communication
Theory of Secrecy Systems” is an application of communication theory in the field of
cryptology. It has a theoretical approach and is concerned with general mathematical
structure and properties of secrecy systems. The paper introduces a model of secrecy
systems and defines it abstractly as a set of transformation of one space (the set of
possible message) into a second set (the set of possible cryptograms). Among its
limitations, the paper only addresses the “true” secrecy systems and is concerned with the
case of discrete information where the message to be enciphered consists of a sequence of
discrete symbols, each chosen from a finite set. The paper is divided into three parts. The
first part addresses the basic mathematical structure of secrecy systems. The second part
is concerned with the problem of “theoretical secrecy” while the final part deals with
“practical secrecy.”
Hill’s paper “Cryptography in an Algebraic Alphabet” involved combinatory algebra and
was concerned with general linear substitutions. In particular, Hill proposed selfreciprocal homogenous linear substitutions (with N=26). He designed a mechanical
device with geared wheels for linear substitutions (n=6). Here n represents the encryption
width. These machines were used for superencrypting three-letter code groups of radio
call signs. Hill’s cipher system had a great impact upon cryptology. Since his invention
the value of mathematical methods in cryptology has been unchallenged.
Gurvirender Tejay
02/04/2004
Reference
1. Bauer, F.L. (2000), Decrypted Secrets: Methods and Maxims of Cryptology. New
York: Springer.
2. Hill, L.S. (1929). “Cryptography in an Algebraic Alphabet.” The American
Mathematical Monthly, 36:306-312.
3. Shannon, C.E. (1949). “Communication Theory of Secrecy Systems.” Bell
System Technical Journal, 28:656-715.
Download